NCC Group Research Blog
They Ought to Know Better: Exploiting Security Gateways via their Web Interfaces
1 year 1 month ago
Thin Clients: Slim Security
1 year 1 month ago
The why behind web application penetration test prerequisites
1 year 1 month ago
There’s A Hole In Your SoC: Glitching The MediaTek BootROM
1 year 1 month ago
The SSL Conservatory
1 year 1 month ago
The Update Framework (TUF) Security Assessment
1 year 1 month ago
The Sorry State of Aftermarket Head Unit Security
1 year 1 month ago
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
1 year 1 month ago
The role of security research in improving cyber security
1 year 1 month ago
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
1 year 1 month ago
The Pentesters Guide to Akamai
1 year 1 month ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
1 year 1 month ago
The Phishing Guide: Understanding & Preventing Phishing Attacks
1 year 1 month ago
The Paillier Cryptosystem with Applications to Threshold ECDSA
1 year 1 month ago
The Password is Dead, Long Live the Password!
1 year 1 month ago
The Next C Language Standard (C23)
1 year 1 month ago
The Mobile Application Hacker’s Handbook
1 year 1 month ago
The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet
1 year 1 month ago
The Importance of a Cryptographic Review
1 year 1 month ago
Checked
3 hours 38 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed